×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
清华大学 [16]
上海电子信息职业技... [11]
山东大学 [9]
长春光学精密机械与物... [8]
西安交通大学 [7]
软件研究所 [7]
更多...
内容类型
期刊论文 [52]
会议论文 [30]
学位论文 [4]
会议 [1]
其他 [1]
发表日期
2020 [1]
2019 [2]
2018 [3]
2017 [5]
2015 [4]
2014 [7]
更多...
学科主题
Electrical... [1]
Engineerin... [1]
computer s... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共88条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Group Multi-Role Assignment With Conflicting Roles and Agents
期刊论文
IEEE/CAA Journal of Automatica Sinica, 2020, 卷号: 7, 期号: 6, 页码: 1498-1510
作者:
Haibin Zhu
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2021/03/11
Agents
environments-classes, agents, roles, groups, and objects (E-CARGO) model
group multi-role assignment (GMRA)
group role assignment with constraints (GRA
+
)
roles
role-based collaboration (RBC)
Corrigendum: Effect of perceived negative workplace gossip on employees' behaviors [Front. Psychol., 9, 1112, (2018)] doi: 10.3389/fpsyg.2018.01112
期刊论文
Frontiers in Psychology, 2019, 卷号: 9, 期号: JAN
作者:
Kong M.
收藏
  |  
浏览/下载:28/0
  |  
提交时间:2019/12/11
Hostile attribution bias
In-role behavior
Organization-based self-esteem
Organizational citizenship behavior
Perceived insider status
Perceived negative workplace gossip
Effect of Perceived Negative Workplace Gossip on Employees' Behaviors (vol 9, pg 1112, 2018)
期刊论文
FRONTIERS IN PSYCHOLOGY, 2019, 卷号: 9
作者:
Kong, Ming
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2019/12/11
perceived negative workplace gossip
in-role behavior
organizational
citizenship behavior
organization-based self-esteem
perceived insider
status
hostile attribution bias
Contexts-States-Aware Access Control for Internet of Things
会议论文
作者:
Dong, Yuji
;
Wan, Kaiyu
;
Huang, Xin
;
Yue, Yong
收藏
  |  
浏览/下载:23/0
  |  
提交时间:2019/11/19
Access control policies
Attribute based access control
Extensible access control markup languages
Internet of Things (IOT)
Reference architecture
Role-based Access Control
Semantic Web rule language (SWRL)
Semantic Web technology
Context-based security and privacy for healthcare IoT
会议论文
作者:
Alagar, Vangalur
;
Alsaig, Alaa
;
Ormandjieva, Olga
;
Wan, Kaiyu
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/11/26
Context
Context sensitive
Healthcare industry
Information collections
Real time monitoring
Role-based Access Control
Security
Security and privacy
Effect of Perceived Negative Workplace Gossip on Employees' Behaviors
期刊论文
FRONTIERS IN PSYCHOLOGY, 2018, 卷号: 9
作者:
Kong, Ming
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/11
perceived negative workplace gossip
in-role behavior
organizational
citizenship behavior
organization-based self-esteem
perceived insider
status
hostile attribution bias
A Role-Based Access Control System for Intelligent Buildings
会议论文
作者:
Xue, Nian
;
Jiang, Chenglong
;
Huang, Xin
;
Liu, Dawei
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/11/26
Role-Based Access Control (RBAC)
Intelligent buildings
Cloud-based
Security protocol
Generic construction of role-based encryption in the standard model
期刊论文
International Journal of Security and Networks, 2017, 卷号: 12, 页码: 198-205
作者:
Li, BaoHong
;
Li, BaoJun
;
Zhao, YinLiang
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/11/26
Access control policies
Adaptive security
Ciphertexts
Cloud storages
Inner product
Partial order relation
Role hierarchy
Role-based
Role-based Access Control
User revocation
Chapter 7 – Information Security
期刊论文
Building the Agile Enterprise (Second Edition), 2017, 页码: 209-246
作者:
FredA.Cummins
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2019/12/24
Information
security
Security
risks
Risk
mitigation
Security
of
the
agile
enterprise
Public
key
infrastructure
Electronic
signature
Identification
and
authentication
Digital
certificates
Single
sign-on
Role-based
access
control
Role
authorization
model
SAML
Risk
mitigation
Achieving Flexible and Self-Contained Data Protection in Cloud Computing
期刊论文
IEEE ACCESS, 2017, 卷号: 5, 页码: 1510-1523
作者:
Lang, Bo
;
Wang, Jinmiao
;
Liu, Yanxi
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/30
Role-based access control
ciphertext-policy attribute-based encryption
self-contained data protection
cloud computing
©版权所有 ©2017 CSpace - Powered by
CSpace